ben-dns/named.conf.local

269 lines
6.5 KiB
Plaintext

//
// Do any local configuration here
//
// Consider adding the 1918 zones here, if they are not used in your
// organization
// include "/etc/bind/zones.rfc1918";
acl internals {
127.0.0.1;
192.168.1.0/24;
};
include "/etc/bind/tilde_msT.key";
include "/etc/bind/certbot.key";
server 89.163.145.170 { keys { tilde_msT; }; };
zone "tildeverse.net" {
type master;
file "/etc/bind/zones/db.tildeverse.net";
also-notify { 167.114.154.31; 89.163.145.170; };
allow-transfer { 167.114.154.31; key tilde_msT;};
update-policy {
grant certbot name _acme-challenge.tildeverse.net. txt;
};
};
zone "tildeverse.org" {
type master;
file "/etc/bind/zones/db.tildeverse.org";
allow-transfer { 167.114.154.31; key tilde_msT; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.tildeverse.org. txt;
};
};
zone "fuckup.club" {
type master;
file "/etc/bind/zones/db.fuckup.club";
allow-transfer { 167.114.154.31; key tilde_msT; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.fuckup.club. txt;
};
};
zone "nand.pub" {
type master;
file "/etc/bind/zones/db.nand.pub";
allow-transfer { 167.114.154.31; key tilde_msT; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.nand.pub. txt;
};
};
zone "nand.sh" {
type master;
file "/etc/bind/zones/db.nand.sh";
allow-transfer { 167.114.154.31; key tilde_msT; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.nand.sh. txt;
};
};
zone "nand.team" {
type master;
file "/etc/bind/zones/db.nand.team";
allow-transfer { 167.114.154.31; key tilde_msT; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.nand.team. txt;
};
};
zone "nand.zone" {
type master;
file "/etc/bind/zones/db.nand.zone";
allow-transfer { 167.114.154.31; key tilde_msT; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.nand.zone. txt;
};
};
zone "tild3.club" {
type master;
file "/etc/bind/zones/db.tild3.club";
allow-transfer { 167.114.154.31; key tilde_msT; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.tild3.club. txt;
};
};
zone "tild3.org" {
type master;
file "/etc/bind/zones/db.tild3.org";
allow-transfer { 167.114.154.31; key tilde_msT; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.tild3.org. txt;
};
};
zone "tilde.chat" {
type master;
file "/etc/bind/zones/db.tilde.chat";
allow-transfer { 167.114.154.31; key tilde_msT; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.tilde.chat. txt;
};
};
zone "tildegit.org" {
type master;
file "/etc/bind/zones/db.tildegit.org";
allow-transfer { 167.114.154.31; key tilde_msT; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.tildegit.org. txt;
};
};
zone "tilde.life" {
type master;
file "/etc/bind/zones/db.tilde.life";
allow-transfer { 167.114.154.31; key tilde_msT; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.tilde.life. txt;
};
};
zone "tildenet.org" {
type master;
file "/etc/bind/zones/db.tildenet.org";
allow-transfer { 167.114.154.31; key tilde_msT; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.tildenet.org. txt;
};
};
zone "tilde.news" {
type master;
file "/etc/bind/zones/db.tilde.news";
allow-transfer { 167.114.154.31; key tilde_msT; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.tilde.news. txt;
};
};
zone "tildenic.org" {
type master;
file "/etc/bind/zones/db.tildenic.org";
allow-transfer { 167.114.154.31; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.tildenic.org. txt;
};
};
zone "tilde.ninja" {
type master;
file "/etc/bind/zones/db.tilde.ninja";
allow-transfer { 167.114.154.31; key tilde_msT; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.tilde.ninja. txt;
};
};
zone "tilde.pizza" {
type master;
file "/etc/bind/zones/db.tilde.pizza";
allow-transfer { 167.114.154.31; key tilde_msT; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.tilde.pizza. txt;
};
};
zone "tilderadio.org" {
type master;
file "/etc/bind/zones/db.tilderadio.org";
allow-transfer { 167.114.154.31; key tilde_msT; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.tilderadio.org. txt;
};
};
zone "tilde.site" {
type master;
file "/etc/bind/zones/db.tilde.site";
allow-transfer { 167.114.154.31; key tilde_msT; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.tilde.site. txt;
};
};
zone "tilde.team" {
type master;
file "/etc/bind/zones/db.tilde.team";
allow-transfer { 167.114.154.31; key tilde_msT; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.tilde.team. txt;
};
};
zone "tildeteam.org" {
type master;
file "/etc/bind/zones/db.tildeteam.org";
allow-transfer { 167.114.154.31; key tilde_msT; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.tildeteam.org. txt;
};
};
zone "tilde.wiki" {
type master;
file "/etc/bind/zones/db.tilde.wiki";
allow-transfer { 167.114.154.31; key tilde_msT; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.tilde.wiki. txt;
};
};
zone "tilde.wtf" {
type master;
file "/etc/bind/zones/db.tilde.wtf";
allow-transfer { 167.114.154.31; key tilde_msT; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.tilde.wtf. txt;
};
};
zone "tilde.zone" {
type master;
file "/etc/bind/zones/db.tilde.zone";
allow-transfer { 167.114.154.31; key tilde_msT; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.tilde.zone. txt;
};
};
zone "ttm.sh" {
type master;
file "/etc/bind/zones/db.ttm.sh";
allow-transfer { 167.114.154.31; key tilde_msT; };
also-notify { 167.114.154.31; 89.163.145.170; };
update-policy {
grant certbot name _acme-challenge.ttm.sh. txt;
};
};